unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Securing our future: September 2024 progress update on Microsoft’s Secure Future Initiative (SFI)
In November 2023, we introduced the Secure Future Initiative (SFI) to advance cybersecuri...
2024-9-23 23:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
sfi
tenants
Join us at Microsoft Ignite 2024 and learn to build a security-first culture with AI
For security professionals and teams, AI offers a significant advantage, empowering organizations o...
2024-9-20 00:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
ignite
leaders
govern
How comprehensive security simplifies the defense of your digital estate
Cybersecurity jobs are more challenging than ever. It’s not just increased speed, scale, and sophis...
2024-9-19 00:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
evolving
North Korean threat actor Citrine Sleet exploiting Chromium zero-day
On August 19, 2024, Microsoft identified a North Korean threat actor exploiting a zero-da...
2024-8-31 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
sleet
domainlist
citrine
defender
The art and science behind Microsoft threat hunting: Part 3
Earlier in Part 11 and Part 22 of this blog series, Microsoft Incident Response outlined...
2024-8-29 03:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
hunt
hunters
informed
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations
Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peac...
2024-8-28 23:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
sandstorm
peach
defender
How Microsoft Entra ID supports US government agencies in meeting identity security requirements
If you’re in charge of cybersecurity for a United States government agency, you’re alread...
2024-8-27 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
entra
phishing
resistant
Microsoft AI Tour: Hear the latest product innovations to elevate your security strategy
For the second year, the Microsoft AI Tour will bring together security practitioners, de...
2024-8-23 00:0:0 | 阅读: 0 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
tour
cities
Microsoft again ranked number one in modern endpoint security market share
Today’s remote workforce has become the standard. But the security challenges created by...
2024-8-22 00:0:0 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
defender
ransomware
worldwide
Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE
Microsoft researchers recently identified multiple medium severity vulnerabilities in Ope...
2024-8-9 02:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
openvpn
attacker
microsoft
openvpnserv
How Microsoft and NIST are collaborating to advance the Zero Trust Implementation
We are announcing the release of the recently published Zero Trust practice guide in coll...
2024-8-7 04:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
nccoe
microsoft
security
New Microsoft whitepaper shares how to prepare your data for secure AI adoption
The era of AI brings many opportunities to companies, from boosts in productivity to gene...
2024-7-31 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
generative
copilot
whitepaper
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption
Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited...
2024-7-30 00:0:0 | 阅读: 3 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
ransomware
hypervisors
security
esx
Windows Security best practices for integrating and managing security tools
Windows is an open and flexible platform used by many of the world’s top businesses for h...
2024-7-28 06:24:3 | 阅读: 10 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
fffff806
windows
csagent
ffff9405
Onyx Sleet uses array of malware to gather intelligence for North Korea
On July 25, 2024, the United States Department of Justice (DOJ) indicted an individual li...
2024-7-25 23:57:18 | 阅读: 1 |
收藏
|
Microsoft Security Blog - www.microsoft.com
onyx
sleet
microsoft
defender
korean
Zero Trust in the Age of AI: Join our online event to learn how to strengthen your security posture
Cybercrime never sleeps and the threat actors behind it never stop evolving their tactics...
2024-7-25 00:0:0 | 阅读: 2 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
entra
unified
principles
Connect with Microsoft Security at Black Hat USA 2024
Black Hat USA 2024 is packed with timely, relevant information for today’s security profe...
2024-7-18 00:0:0 | 阅读: 6 |
收藏
|
Microsoft Security Blog - www.microsoft.com
security
microsoft
innovation
senior
Microsoft Purview Data Governance will be generally available September 1, 2024
We are excited to announce that the new Microsoft Purview Data Governance solution will b...
2024-7-16 23:0:0 | 阅读: 5 |
收藏
|
Microsoft Security Blog - www.microsoft.com
governance
microsoft
purview
security
fabric
Simplified Zero Trust security with the Microsoft Entra Suite and unified security operations platform, now generally available
We’re announcing new capabilities to help accelerate your transition to a Zero Trust secu...
2024-7-12 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
microsoft
security
entra
unified
defender
Vulnerabilities in PanelView Plus devices could lead to remote code execution
Microsoft discovered and responsibly disclosed two vulnerabilities in Rockwell Automation...
2024-7-3 00:0:0 | 阅读: 4 |
收藏
|
Microsoft Security Blog - www.microsoft.com
cip
microsoft
rockwell
remote
Previous
2
3
4
5
6
7
8
9
Next